Search Result
Save to File
Your search for
31025
returns
5379
document(s)
Theory frame of water resources security monitoring, Hal. 3737-3741
Author: Mingqi Chang; Lei Xu; Yue Wang; Shaohua Lu; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Software protection : practical and legal steps to protect and market computer programs/ G. Gervaise Davis III
Author: Davis, G. Gervaise; | Call Number: 347.306 Dav s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical unix & internet security/O'reilly & Associates, Inc
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan router security policy dengan mengevaluasi screening router study kasus : last mile internet provider
Author: Ferdi S.Tasik; | Call Number: T-0383 (Softcopy T-0022) | Edition: 2003 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
15
16
17
18
19
20
21
22
23
24
Next